How an ordinary computer user can avoid becoming part of the malware problem

Cyber criminals can infiltrate computers and corporate networks in a variety of ways, including the use of “malware” — malicious software that can be downloaded to computers without the users ever knowing — and “social engineering” — which amounts to tricking computers users into revealing passwords and other confidential data.

Cyber criminals can infiltrate computers and corporate networks in a variety of ways, including the use of “malware” — malicious software that can be downloaded to computers without the users ever knowing — and “social engineering” — which amounts to tricking computers users into revealing passwords and other confidential data.

Here are five steps to help computer users avoid becoming a target of cybercrime, and prevent personal computers from being enlisted by hackers to conduct cyber espionage around the globe:

1. Update software.

Guarding against malware is never-ending, with security specialists struggling to keep up with the hackers. For both corporate and individual users, updating and patching software is a must to keep ahead of those who exploit weaknesses in software code. For example, if your web browser uses an outdated version of Java, it could be vulnerable to hackers. The same applies to other software that you may have installed but never bothered to update.

2. Use anti-virus and security software.

Security software, which ranges from that administered by your corporate IT department to consumer versions for computers, notebooks, smartphones and other mobile devices, provides an important layer of defence. For home users, it’s important to remember anti-virus or security software isn’t to be installed and forgotten, but should be set for auto-updating so it will recognize new and updated viruses, block attempted attacks, and warn of such dangers as infected websites.

3. Beware of bogus emails and websites that may not be what they seem.

“Social engineering” is a little trickier to guard against, particularly if you have a number of employees in your business, or if your kids, friends or others use your home computers.

Phishing, which is the practice of sending spam email that purports to be from banks or other legitimate businesses in an effort to get people to click on a website and/or enter confidential data, is on the decline in Canada. But that is only because cyber criminals are more closely targeting their victims, and our national pastime of updating social networks with details of our lives is helping them to do that.

Don’t click on links in emails, even if they appear to be from someone you know, particularly if the email is urging you to go to your bank or corporate website to update log-in information or other details.

4. Don’t assume that anything you post on social networks will only be seen by those you intend to have see it.

The Facebook posts of someone who works in an IT department could reveal enough information to allow a hacker to craft a carefully tailored email purporting to be from the boss or someone else the recipient would know. The email could be used to gain passwords or pave the way for malware, effectively giving hackers the keys to the corporate vault so they can steal anything from customer credit card data to high-level and lucrative intellectual property.

5. Don’t assume that your computer is of no interest to hackers.

In cyber-espionage, your computer could become a “robot” in an army controlled by hackers anywhere in the world, and used to carry out cyber-attacks or disseminate spam. Gone are the days when a hacker wants to crash your computer. Today’s stealth hacker could be using your computer, conveying orders and setting it to tasks remotely, without alerting you to your computer’s secret life.

Story Tools

Cyber criminals can infiltrate computers and corporate networks in a variety of ways, including the use of “malware” — malicious software that can be downloaded to computers without the users ever knowing — and “social engineering” — which amounts to tricking computers users into revealing passwords and other confidential data.

We encourage all readers to share their views on our articles and blog posts. We are committed to maintaining a lively but civil forum for discussion, so we ask you to avoid personal attacks, and please keep your comments relevant and respectful. If you encounter a comment that is abusive, click the "X" in the upper right corner of the comment box to report spam or abuse. We are using Facebook commenting. Visit our FAQ page for more information.

Almost Done!

Postmedia wants to improve your reading experience as well as share the best deals and promotions from our advertisers with you. The information below will be used to optimize the content and make ads across the network more relevant to you. You can always change the information you share with us by editing your profile.

By clicking "Create Account", I hearby grant permission to Postmedia to use my account information to create my account.

I also accept and agree to be bound by Postmedia's Terms and Conditions with respect to my use of the Site and I have read and understand Postmedia's Privacy Statement. I consent to the collection, use, maintenance, and disclosure of my information in accordance with the Postmedia's Privacy Policy.

Postmedia wants to improve your reading experience as well as share the best deals and promotions from our advertisers with you. The information below will be used to optimize the content and make ads across the network more relevant to you. You can always change the information you share with us by editing your profile.

By clicking "Create Account", I hearby grant permission to Postmedia to use my account information to create my account.

I also accept and agree to be bound by Postmedia's Terms and Conditions with respect to my use of the Site and I have read and understand Postmedia's Privacy Statement. I consent to the collection, use, maintenance, and disclosure of my information in accordance with the Postmedia's Privacy Policy.